1. 7. Techniques That Address Multiple Availability Requirements
    1. Redundancy
      1. Hardware Redundancy Examples
      2. Software Redundancy Examples
      3. Environmental Redundancy Example
      4. Critical Success Factors
    2. Backup of Critical Resources
      1. Methods of Backup
      2. Hardware Backup Examples
      3. Software Backup Examples
      4. IT Operations Backup Examples
      5. Critical Success Factors
        1. Currency of backup
        2. Automated updating of backups
        3. Isolation of backup from primary
        4. Backup and restore procedure review and testing
        5. Generations of backups
        6. Integrity verification
    3. Clustering
      1. Comparing Clustering and Redundancy
      2. Hardware and Software Clustering Examples
      3. IT Operations Clustering Examples
      4. Environmental Clustering Examples
      5. Critical Success Factors
        1. Automatic load-sharing
        2. Physical separation of clustered components
    4. Fault Tolerance
      1. Hardware Fault Tolerance Examples
      2. Software Fault Tolerance Examples
      3. Environmental Fault Tolerance Examples
      4. Critical Success Factors
    5. Isolation or Partitioning
      1. Hardware Isolation Examples
      2. Software Isolation Examples
      3. Other Benefits of Isolation
        1. Minimize risk of changes
        2. Reduce resource contention
        3. Maximize resources
        4. Simpler systems management procedures
      4. Critical Success Factors
    6. Automated Operations
      1. Console and Network Operations Examples
      2. Workload Management Examples
      3. System Resource Monitoring Examples
      4. Problem Management Applications
      5. Distribution of Resources Example
      6. Backup and Restore Examples
      7. Critical Success Factors
    7. Access Security Mechanisms
      1. Steps to Secure Access
        1. Step 1: Identify the person requesting access
        2. Step 2: Verify the identity
        3. Step 3: Control access
        4. Step 4: Monitor all activities
      2. Types of Security
        1. Physical security
        2. Network security
        3. Application security
        4. Computer resource security
      3. Password Management
        1. Step 1: Enforce password selection guidelines
        2. Step 2: Expire passwords regularly
        3. Step 3: Expire assigned passwords on first use
        4. Step 4: Disable user accounts after successive invalid password attempts
        5. Step 5: Educate users on how to protect their password information
      4. Critical Success Factors
    8. Standardization
      1. Hardware Standardization Examples
      2. Software Standardization Examples
      3. Network Standardization Examples
      4. Processes and Procedures Standardization Examples
      5. Naming Standardization Examples
      6. Critical Success Factors
      7. Transitioning to Standardization
    9. Summary
  2.  

    8. Special Techniques for System Reliability

    1. The Use of Reliable Components
      1. Techniques for Maximizing Hardware Component Reliability
        1. Choose components with low failure rates
        2. Choose components that have high MTBF
        3. Purchase from reputable suppliers
        4. Use technical specifications as a gauge
        5. Choose products with fewer parts or greater integration
        6. Avoid newly developed products whenever possible
        7. Follow maintenance schedules diligently
      2. Techniques for Maximizing Software Component Reliability
        1. Avoid using "Version 1" and "Beta" software
        2. Don't use shareware or freeware
        3. Buy industry-standard software from reliable vendors
        4. Prior to installation, test for viruses
        5. Provide menus and other ways to control user inputs
        6. Reuse bug-free components or modules
        7. Test programs thoroughly
        8. Run "beta tests" with a controlled set of users
        9. Install the latest application software fixes judiciously
        10. Install the latest device drivers when available
        11. Upgrade to newer operating systems with caution
        12. Minimize the use of system utilities
      3. Personnel-Related Techniques for Maximizing Reliability
        1. Ensure high-quality user training
        2. Ensure quality training of support staff members
        3. Be wary of contractual hires
      4. Environment-Related Techniques for Maximizing Reliability
        1. Install Automatic Voltage Regulators (AVRs)
        2. Use adequate air-conditioning equipment
      5. Some Reliability Indicators for Suppliers
        1. Time in business
        2. Quality certification
        3. Industry awards
        4. Peer recommendation
        5. Warranty and support
    2. Programming to Minimize Failures
      1. Correctness
        1. Ensure user requirements are adequately determined
        2. Prototype the application prior to detailed coding
        3. Revalidate user requirements midway through the project
        4. Beta test prior to wide-scale deployment
      2. Robustness
        1. Test against out-of-bounds values
        2. Trap errors and prevent them from propagating
        3. Anticipate external changes
      3. Extensibility
        1. User changes
        2. System platform changes
        3. Regulatory changes
        4. Budgetary changes
        5. Business volume changes
        6. Business demand changes
        7. Generous database field sizes
        8. Design with overcapacity
        9. Place constant values in a look-up table
      4. Reusability
    3. Implement Environmental Independence Measures
      1. Use Power Generators
      2. Use Independent Air-Conditioning Units
      3. Use Fire Protection Systems
      4. Use Raised Flooring
      5. Install Equipment Wheel Locks
      6. Locate Computer Room on the Second Floor
    4. Utilize Fault Avoidance Measures
      1. Analyzing Problem Trends and Statistics
      2. Use of Advanced Hardware Technologies
      3. Use of Software Maintenance Tools
    5. Summary
  3.  

    9. Special Techniques for System Recoverability

    1. Automatic Fault Recognition
      1. Parity Checking Memory
      2. ECC Memory
      3. Data Validation Routines
    2. Fast Recovery Techniques
    3. Minimizing Use of Volatile Storage Media
      1. Regular Database Updates to Central Storage
      2. Automatic File-Save Features
    4. Summary
  4.  

    10. Special Techniques for System Serviceability

    1. Online System Redefinition
      1. Add or Remove I/O Devices
      2. Selectively Power Down Subsystems
      3. Commit or Reject Changes
    2. Informative Error Messages
      1. Use Standard Corporate Terminology
      2. Adopt Terms Already Used by Common Applications
      3. Tell What, Why, Impact, and How
      4. Implement Context-Sensitive Help
      5. Give Options for Viewing More Detailed Error Information
      6. Make Error Information Available After the Error Has Been Cleared
    3. Complete Documentation
      1. Have a Manual of Operations On Hand
      2. Write Basic Problem Isolation and Recovery Guides
      3. Provide System Configuration Diagrams
      4. Label Resources
      5. Provide a Complete Technical Library
    4. Installation of Latest Fixes and Patches
    5. Summary
  5.  

    11. Special Techniques for System Manageability

    1. Use Manageable Components
      1. Simple Network Management Protocol (SNMP)
      2. Common Management Information Protocol (CMIP)
      3. Desktop Management Interface (DMI)
      4. Common Information Management Format (CIM)
      5. Wired for Management (WfM)
    2. Management Applications
      1. Systems Management Issues
        1. Deployment
        2. Operations
        3. Security
      2. Automated Systems Management Capabilities
      3. System Management Applications and Frameworks
        1. Unicenter TNG (Computer Associates)
        2. Tivoli (IBM)
    3. Educate IS Personnel on Systems Management Disciplines
      1. Business Value of the Information System
      2. Value of Systems Management Disciplines
      3. Principles of Management
      4. Basic Numerical Analysis Skills
    4. Summary
  6.  

    12. All Together Now

    1. The Value of Systems Management Disciplines
    2. Which One First?
    3. Analyze Outages
    4. Identify Single Points of Failure
    5. Exploit What You Have
    6. An Implementation Strategy
    7. Summary

Techniques for HA IT Management的更多相关文章

  1. R语言书籍的学习路线图

    现在对R感兴趣的人越来越多,很多人都想快速的掌握R语言,然而,由于目前大部分高校都没有开设R语言课程,这就导致很多人不知道如何着手学习R语言. 对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑 ...

  2. juce中的内存泄漏检测

    非常值得借鉴的做法,基于引用计数和局部静态变量,代码比较简单不加详解. //============================================================== ...

  3. R语言学习路线和常用数据挖掘包(转)

    对于初学R语言的人,最常见的方式是:遇到不会的地方,就跑到论坛上吼一嗓子,然后欣然or悲伤的离去,一直到遇到下一个问题再回来.当然,这不是最好的学习方式,最好的方式是——看书.目前,市面上介绍R语言的 ...

  4. Apache Hadoop 2.9.2 的HDFS High Available模式部署

    Apache Hadoop 2.9.2 的HDFS High Available 模式部署 作者:尹正杰 版权声明:原创作品,谢绝转载!否则将追究法律责任. 我们知道,当NameNode进程挂掉后,可 ...

  5. High Performance Networking in Google Chrome

    小结: 1. 小文件存储于一个文件中: 在内部,磁盘缓存(disk cache)实现了它自己的一组数据结构, 它们被存储在一个单独的缓存目录里.其中有索引文件(在浏览器启动时加载到内存中),数据文件( ...

  6. R语言 一套内容 从入门 到放弃

    [怪毛匠子整理] 1.下载 wget http://mirror.bjtu.edu.cn/cran/src/base/R-3/R-3.0.1.tar.gz 2.解压: tar -zxvf R-3.0. ...

  7. R语言学习路线图-转帖

    本文分为6个部分,分别介绍初级入门,高级入门,绘图与可视化,计量经济学,时间序列分析,金融等. 1.初级入门 <An Introduction to R>,这是官方的入门小册子.其有中文版 ...

  8. VCAP5-DCA – What’s new?

    see also: 韩国人的教材:http://ddii.pe.kr/ Section 1.1 – Implement and Manage complex storage Determine use ...

  9. Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来

    Gartner 2018 年WAF魔力象限报告:云WAF持续增长,Bot管理与API安全拥有未来 来源 https://www.freebuf.com/articles/paper/184903.ht ...

随机推荐

  1. TCP_Wrappers

    TCP_Wrappers配置 这里主要涉及到两个配置文件/etc/hosts.allow和/etc/hosts.deny./usr/sbin/tcpd进程会根据这两个文件判断是否对访问请求提供服务. ...

  2. MySQL的binlog操作

    1. MySQL的binlog有三种模式: statement, row and mixed, 从5.1开始支持row, 默认是row模式 2. 设置参数 # 要配置在mysqld下 [mysqld] ...

  3. 【jsPDF】jsPDF插件实现将html页面转换成PDF,并下载,支持分页

    1.目的:在前段是 jQuery库 或者 VUE库 或者两者混合库,将html 页面和数据 转换成PDF格式并下载,支持分页 1.项目背景: 对客户报修记录进行分类统计,并生成各种饼图.柱状图.线性图 ...

  4. Tomcat无法访问中文路径的解决办法

    来源于:http://sccassiel.blog.51cto.com/5398709/1141821/ 修改tomcat下的conf/server.xml文件下的 <Connector por ...

  5. ASP.NET 对类进行XML序列化和反序列化

    1 序列化方法 public void SerializeObject<T>(string Xmlname,T t) { XmlSerializer ser = new XmlSerial ...

  6. OnPreRender事件常见用法

    protected override void OnPreRender(EventArgs e) 1) 加入脚本 protected override void OnPreRender(EventAr ...

  7. java节假日api--关于节假日想到的

    http://goseek.cn/index.php. 跟一园友讨论节假日问题得之一网址...涨姿势...(仅限中国节假日) http://api.goseek.cn/ 另一网友整理了测试类: htt ...

  8. 修改cnblogs日历控件CSS

    自定义cnblogs日期控件的样式时, 关于透明度 控件头部死活没法透明 在background属性值后边添加!important即把cnblogs系统自带的属性覆盖, 解决了该问题. !import ...

  9. [Spring学习笔记 7 ] Spring中的数据库支持 RowMapper,JdbcDaoSupport 和 事务处理Transaction

    1.Spring中的数据库支持 把具有相同功能的代码模板抽取到一个工具类中.2.关于jdbc template的应用 jdbcTemplate模板操作类,把访问jdbc的模板抽取到template中, ...

  10. 双链表实现Queue

    算法导论第10章的东西,感觉用双链表真心简单,就是有点浪费空间,但是时间复杂度O(1): #include <stdio.h> struct LinkNode { LinkNode(): ...